39 bytes small Linux/x86 egghunter null-free shellcode. The egghunter dynamically searches memory for 2 instances of the egg. When the eggs are found, the egghunter passes execution control to the payload at the memory address of the eggs.
f15f64c0d4291382054a30e3697719a38ea41de5b89587531e1baff5818409e8
80 bytes small Linux/x86 reverse shell generator shellcode with customizable TCP port and IP address.
b6288f9069a67ab9a6e3d01fe3b23d7615e89b3fbb4002b6507be11140b269ff
155 bytes small Linux/x86 shellcode that has a MMX stub decoder that dynamically decodes the payload in memory. The FPU GetPC technique is used to determine the offset from EIP dynamically in running memory. Once decoded. this shellcode adds the user 'ctl' with the password 'ctl' to the /etc/passwd file with the UID and GID of 0 (root). This shellcode uses legacy passwd functionality. Therefore the /etc/shadow file does not need to be accessed or modified.
d72edd6daaf006feaf82398a3b67d4281ff9258ee56eeaedca56c7d0ab3e4980
URLCrazy is a tool that can generate and test domain typos and variations to detect and perform typo squatting, URL hijacking, phishing, and corporate espionage. It generates 15 types of domain variants, knows over 8000 common misspellings, supports multiple keyboard layouts, can check if a typo is a valid domain, tests if domain typos are in use, and estimates the popularity of a typo.
7f0f74c0f7cca19b89445bbdc168cdb6604de03bba13061be360561afade6290
107 bytes small Linux/x86 shellcode that adds the user 'ctl' with the password 'ctl' to the /etc/passwd file with the UID and GID of 0 (root). This shellcode uses legacy passwd functionality. Therefore the /etc/shadow file does not need to be accessed or modified.
e9483cceb2d45bc3e4c29c88655dc4a6e6bcedc432d98e81e5ab936189311836
57 bytes small Linux/x64_86 /bin/bash shellcode. The stub decodes the ROL Encoded shellcode. When the stub has finished decoding the payload, execution control is passed to the payload.
0b2a9ee02c0b7d0258cad51519bebf538bc5adf11a6b79a09c2f9a31449092a7
Furukawa Electric ConsciusMAP version 2.8.1 java deserialization remote code execution exploit.
0955da08cc537744d5dca5fea06f5e92ca016b5cb01825a79799c4dcb0cf48c1
Air Sender version 1.0.2 for iOS suffers from an arbitrary file upload vulnerability.
a14b5d2f646f6165a431ce48859d7864075a081083d1b18d936ddaab47e98f1d
Edimax EW-7438RPn version 1.13 suffers from a remote code execution vulnerability.
509213c937fc32c56ee29c0bc1db6b5c0727a2aa493a45f8fdbcbfc6bcd2ec8d
EspoCRM version 5.8.5 suffers from a privilege escalation vulnerability.
5b6c8700801dc5ddf2ded85c2e7bdef037b187d0026ed691cd3b75a1841444fe
272 bytes small Linux/x86_64 null free password protected bindshell shellcode.
3b354d90a8edf71f759af7fb2d5a48d129b38945626e7de89ff29bd0b2c1fa8f
63 bytes small Linux/x64_86 dynamic egghunter shellcode that searches memory for 2 instances of the egg. When the eggs are found, the egghunter passes execution control to the payload at the memory address of the eggs. The payload is an execve(/bin/bash) shellcode.
c3ff54b357a821a1566c2d7a70204024eb13af4cdf6c240a1725a87696156951
Popcorn Time version 6.2 suffers from an unquoted service path vulnerability.
5af03f63de881c0d2a07d293d3c853311d6a2303af51a1f304784d2ee91ea066